{"id":74677,"date":"2022-10-12T05:00:26","date_gmt":"2022-10-12T12:00:26","guid":{"rendered":"https:\/\/forescoutstage.wpengine.com\/?p=74677"},"modified":"2022-10-19T13:47:00","modified_gmt":"2022-10-19T20:47:00","slug":"the-riskiest-connected-devices-in-enterprise-networks","status":"publish","type":"post","link":"https:\/\/www.forescout.com\/blog\/the-riskiest-connected-devices-in-enterprise-networks\/","title":{"rendered":"The Riskiest Connected Devices in Enterprise Networks"},"content":{"rendered":"<p>The growing number and diversity of connected devices in every industry presents new challenges for organizations to understand and manage the risks they are exposed to. Most organizations now host a combination of interconnected IT, OT and IoT devices in their networks that has increased their attack surface.<\/p>\n<p>According to a <a href=\"https:\/\/query.prod.cms.rt.microsoft.com\/cms\/api\/am\/binary\/RWREzU\" target=\"_blank\" rel=\"noopener\">recent report<\/a> by the Ponemon Institute, 65% of responding organizations say that IoT\/OT devices are one of the least secured parts of their networks, while 50% say that attacks against these devices have increased. IT and IT security practitioners in 88% of those organizations have IoT devices connected to the internet, 56% have OT devices connected to the internet and 51% have the OT network connected to the IT network.<\/p>\n<p style=\"font-weight: 400;\">Threat actors are well aware of these trends. We recently reported on how <a href=\"\/blog\/ransomware-trends-in-2022h1-state-sponsored-ransomware-new-popular-targets-and-evolving-extortion-techniques\/\">ransomware groups<\/a> have started massively targeting devices such as NAS, VoIP and hypervisors. Not surprisingly, most of these devices were among the riskiest we identified in the 2020 <a href=\"\/the-enterprise-of-things-security-report-state-of-iot-security-in-2020\/\">Enterprise of Things Security Report<\/a>.<\/p>\n<p style=\"font-weight: 400;\">In this blog post and in our <a href=\"\/resources\/the-riskiest-connected-devices-in-enterprise-networks\/\" target=\"new\" rel=\"noopener\">full report<\/a>, we update our findings from two years ago by analyzing millions of devices in Forescout\u2019s Device Cloud using the Forescout Continuum Platform\u2019s new <a href=\"\/solutions\/multifactor-risk-scoring\/\">multifactor risk scoring<\/a> methodology, described below.<\/p>\n<p>Many of the device types observed among the riskiest in 2020 remain in the list, such as networking equipment, VoIP, IP cameras and programmable logic controllers (PLCs). However, new entries such as hypervisors and human machine interfaces (HMIs) are representative of trends including <a href=\"https:\/\/threatpost.com\/critical-vmware-bugs-esxi-fusion-workstation\/178461\/\" target=\"_blank\" rel=\"noopener\">critical vulnerabilities<\/a> and <a href=\"https:\/\/documents.trendmicro.com\/assets\/wp\/wp-hacker-machine-interface.pdf\" target=\"_blank\" rel=\"noopener\">increased OT connectivity<\/a>.<\/p>\n<div style=\"align: center;\"><a href=\"\/resources\/12-riskiest-connected-devices\/\"  title=\"Download the Infographic\" class=\"c-btn c-btn--primary icon-position-right\" target=\"new\"><span class=\"cta-button-text\">Download the Infographic<\/span><\/a><\/div>\n<h2>Quantifying device cybersecurity risk<\/h2>\n<p style=\"font-weight: 400;\">To get a dataset representative of the current device landscape in enterprise networks, we analyzed device data between January 1 and April 30 in Forescout\u2019s Device Cloud, one of the world\u2019s largest repositories of connected enterprise device data including IT, OT, IoT and IoMT. The anonymized data comes from Forescout customer deployments and contains information about almost 19 million devices, a number that grows daily.<\/p>\n<p style=\"font-weight: 400;\">To measure risk on that dataset, we rely on Forescout\u2019s multifactor risk scoring methodology, where the risk of a device is calculated based on three factors: configuration, function and behavior.<\/p>\n<ul>\n<li><em>Configuration<\/em> considers the number and severity of vulnerabilities on the device as well as the number and criticality of open ports.<\/li>\n<li><em>Function<\/em> considers the potential impact to the organization if the device is compromised.<\/li>\n<li><em>Behavior<\/em> considers the reputation of inbound connections to and outbound connections from the device, along with its internet exposure.<\/li>\n<\/ul>\n<p style=\"font-weight: 400;\">After measuring the risk of each individual device, we calculate averages per type of device to understand which types are the riskiest.<\/p>\n<h2>Riskiest connected devices in 2022<\/h2>\n<p style=\"font-weight: 400;\">Using the dataset and scoring methodology described above, we identified the five riskiest devices in four device categories: IT, IoT, OT and IoMT.<\/p>\n<p><!-- Insert Table --><\/p>\n<div class=\"c-responsive-table\">\n<table>\n<tbody>\n<tr>\n<th><\/th>\n<th><b>IT<\/b><\/th>\n<th><b>IoT<\/b><\/th>\n<th><b>OT<\/b><\/th>\n<th><b>IoMT<\/b><\/th>\n<\/tr>\n<tr>\n<td>1<\/td>\n<td>Router<\/td>\n<td>IP camera<\/td>\n<td>Programmable logic controller (PLC)<\/td>\n<td>DICOM workstation<\/td>\n<\/tr>\n<tr>\n<td>2<\/td>\n<td>Computer<\/td>\n<td>VoIP<\/td>\n<td>Human machine interface (HMI)<\/td>\n<td>Nuclear medicine system<\/td>\n<\/tr>\n<tr>\n<td>3<\/td>\n<td>Server<\/td>\n<td>Video conferencing<\/td>\n<td>Uninterruptible power supply (UPS)<\/td>\n<td>Imaging<\/td>\n<\/tr>\n<tr>\n<td>4<\/td>\n<td>Wireless access point<\/td>\n<td>ATM<\/td>\n<td>Environment monitoring<\/td>\n<td>Picture archiving and communication system (PACS)<\/td>\n<\/tr>\n<tr>\n<td>5<\/td>\n<td>Hypervisor<\/td>\n<td>Printer<\/td>\n<td>Building automation controller<\/td>\n<td>Patient monitor<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<p><!-- End Table --><\/p>\n<p style=\"font-weight: 400;\">For an analysis of what makes these devices so risky and their distribution by industry (financial, government, healthcare, manufacturing and retail) and geography (Americas; Asia-Pacific; Europe; and Middle East, Turkey and Africa), <a href=\"\/resources\/the-riskiest-connected-devices-in-enterprise-networks\/\" target=\"new\" rel=\"noopener\">read the full report<\/a>.<\/p>\n<h2>Takeaways and mitigation recommendations<\/h2>\n<p style=\"font-weight: 400;\">Two <a href=\"\/research-labs\/r4iot\/\">recurring themes<\/a> in the recent research of Vedere Labs have been the <em>growing attack surface<\/em> due to more devices being connected to enterprise networks and <em>how threat actors leverage these devices<\/em> to achieve their goals.<\/p>\n<p style=\"font-weight: 400;\">The attack surface now encompasses IT, IoT and OT in almost every organization, with the addition of IoMT in healthcare. It is not enough to focus defenses on risky devices in one category since attackers can leverage devices in different categories to carry out attacks. We have demonstrated this with <a href=\"\/research-labs\/r4iot\/\">R4IoT<\/a>, an attack that starts with an IP camera (IoT), moves to a workstation (IT) and disables PLCs (OT).<\/p>\n<p style=\"font-weight: 400;\">You need proper risk assessment to understand how your attack surface is growing. However, assessing device risk is not easy. For instance, to determine whether a device is vulnerable or not, granular classification information is needed, such as device type, vendor, model and firmware version.<\/p>\n<p style=\"font-weight: 400;\">As an example, take some of the advisories issued by HP in response to the <a href=\"\/company\/blog\/identifying-and-protecting-devices-vulnerable-to-ripple20\/\">Ripple20 vulnerabilities<\/a>. First, HP has multiple versions of their Integrated Lights Out (iLO) out-of-band controllers, at least <a href=\"https:\/\/techhub.hpe.com\/eginfolib\/securityalerts\/Ripple20\/Ripple20.html\" target=\"_blank\" rel=\"noopener\">one confirmed vulnerable (v2) and one confirmed not vulnerable (v5)<\/a>. Simply classifying a device as an \u201cout-of-band controller\u201d (function) or as an \u201cHP iLO\u201d (vendor and model) is not granular enough to determine if that device is vulnerable: we also need the model version. Second, some HP printers are also vulnerable, but they receive automatic firmware updates, so determining if a printer is vulnerable depends on vendor, model, and a firmware version that can change automatically with an unscheduled update.<\/p>\n<p style=\"font-weight: 400;\">The <a href=\"\/products\/\">Forescout Continuum Platform<\/a> solves the risk assessment problem by continuously discovering, granularly classifying and assessing devices without agents or active techniques that could compromise business operations.<\/p>\n<p style=\"font-weight: 400;\">Once you understand your attack surface<em>, <\/em>you need to mitigate risk with automated controls that do not rely only on security agents and that apply to the whole enterprise, instead of silos like the IT network, the OT network or specific types of IoT devices.<\/p>\n<p style=\"font-weight: 400;\">Forescout Continuum enables these types of controls by accelerating the design and deployment of <a href=\"\/blog\/5-steps-to-unsticking-a-stuck-network-segmentation-project\/\">dynamic network segmentation<\/a> across the digital terrain while also <a href=\"\/blog\/cyber-skills-shortage-the-time-for-security-automation-is-now\/\">automating policy enforcement<\/a> by enabling countermeasures to mitigate threats, incidents and compliance gaps.<\/p>\n<p><strong>Understand what makes the riskiest connected devices so risky. Then strive for full visibility into how many are connecting to your digital terrain so you can secure your attack surface.<\/strong><\/p>\n<div style=\"align: center;\"><a href=\"\/resources\/the-riskiest-connected-devices-in-enterprise-networks\/\"  title=\"Read the Report\" class=\"c-btn c-btn--primary icon-position-right\" target=\"new\"><span class=\"cta-button-text\">Read the Report<\/span><\/a><\/div>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The growing number and diversity of connected devices in every industry presents new challenges for organizations to understand and manage the risks they are exposed to. Most organizations now host a combination of interconnected IT, OT and IoT devices in their networks that has increased their attack surface. According to a recent report by the [&hellip;]<\/p>\n","protected":false},"author":124,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"ep_exclude_from_search":false,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[562],"tags":[],"coauthors":[542],"class_list":["post-74677","post","type-post","status-publish","format-standard","hentry","category-news-and-views"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Riskiest IT, IoT, OT &amp; IoMT Devices in Enterprise Networks - Forescout<\/title>\n<meta name=\"description\" content=\"Vedere Labs reveals the riskiest IT, IoT, OT and IoMT devices in enterprise networks, what makes them so risky and how to mitigate their cyber risks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.forescout.com\/blog\/the-riskiest-connected-devices-in-enterprise-networks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Riskiest IT, IoT, OT &amp; IoMT Devices in Enterprise Networks - Forescout\" \/>\n<meta property=\"og:description\" content=\"Vedere Labs reveals the riskiest IT, IoT, OT and IoMT devices in enterprise networks, what makes them so risky and how to mitigate their cyber risks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.forescout.com\/blog\/the-riskiest-connected-devices-in-enterprise-networks\/\" \/>\n<meta property=\"og:site_name\" content=\"Forescout\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ForescoutTechnologies\" \/>\n<meta property=\"article:published_time\" content=\"2022-10-12T12:00:26+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-10-19T20:47:00+00:00\" \/>\n<meta name=\"author\" content=\"Forescout Research - Vedere Labs\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Forescout\" \/>\n<meta name=\"twitter:site\" content=\"@Forescout\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.forescout.com\/blog\/the-riskiest-connected-devices-in-enterprise-networks\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/the-riskiest-connected-devices-in-enterprise-networks\/\"},\"author\":{\"name\":\"Forescout Research - Vedere Labs\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/person\/038ef2eda17d37f87d9978fa703ee984\"},\"headline\":\"The Riskiest Connected Devices in Enterprise Networks\",\"datePublished\":\"2022-10-12T12:00:26+00:00\",\"dateModified\":\"2022-10-19T20:47:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/the-riskiest-connected-devices-in-enterprise-networks\/\"},\"wordCount\":979,\"publisher\":{\"@id\":\"https:\/\/www.forescout.com\/#organization\"},\"articleSection\":[\"News &amp; Views\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.forescout.com\/blog\/the-riskiest-connected-devices-in-enterprise-networks\/\",\"url\":\"https:\/\/www.forescout.com\/blog\/the-riskiest-connected-devices-in-enterprise-networks\/\",\"name\":\"Riskiest IT, IoT, OT & IoMT Devices in Enterprise Networks - Forescout\",\"isPartOf\":{\"@id\":\"https:\/\/www.forescout.com\/#website\"},\"datePublished\":\"2022-10-12T12:00:26+00:00\",\"dateModified\":\"2022-10-19T20:47:00+00:00\",\"description\":\"Vedere Labs reveals the riskiest IT, IoT, OT and IoMT devices in enterprise networks, what makes them so risky and how to mitigate their cyber risks.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/the-riskiest-connected-devices-in-enterprise-networks\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.forescout.com\/blog\/the-riskiest-connected-devices-in-enterprise-networks\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.forescout.com\/blog\/the-riskiest-connected-devices-in-enterprise-networks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.forescout.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Riskiest Connected Devices in Enterprise Networks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.forescout.com\/#website\",\"url\":\"https:\/\/www.forescout.com\/\",\"name\":\"Forescout\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.forescout.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.forescout.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.forescout.com\/#organization\",\"name\":\"Forescout Technologies, Inc.\",\"url\":\"https:\/\/www.forescout.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"contentUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"width\":1,\"height\":1,\"caption\":\"Forescout Technologies, Inc.\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ForescoutTechnologies\",\"https:\/\/x.com\/Forescout\",\"https:\/\/www.instagram.com\/forescouttechnologies\/\",\"https:\/\/www.linkedin.com\/company\/forescout-technologies\",\"https:\/\/www.youtube.com\/user\/forescout1\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/person\/038ef2eda17d37f87d9978fa703ee984\",\"name\":\"Forescout Research - Vedere Labs\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/person\/image\/b4c8db5600adef8fa1a89cc86e15c781\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6f43608a91eb86cde1564e21650235d0ed570d1ae0fbd371a265636ed603e70d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6f43608a91eb86cde1564e21650235d0ed570d1ae0fbd371a265636ed603e70d?s=96&d=mm&r=g\",\"caption\":\"Forescout Research - Vedere Labs\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Riskiest IT, IoT, OT & IoMT Devices in Enterprise Networks - Forescout","description":"Vedere Labs reveals the riskiest IT, IoT, OT and IoMT devices in enterprise networks, what makes them so risky and how to mitigate their cyber risks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.forescout.com\/blog\/the-riskiest-connected-devices-in-enterprise-networks\/","og_locale":"en_US","og_type":"article","og_title":"Riskiest IT, IoT, OT & IoMT Devices in Enterprise Networks - Forescout","og_description":"Vedere Labs reveals the riskiest IT, IoT, OT and IoMT devices in enterprise networks, what makes them so risky and how to mitigate their cyber risks.","og_url":"https:\/\/www.forescout.com\/blog\/the-riskiest-connected-devices-in-enterprise-networks\/","og_site_name":"Forescout","article_publisher":"https:\/\/www.facebook.com\/ForescoutTechnologies","article_published_time":"2022-10-12T12:00:26+00:00","article_modified_time":"2022-10-19T20:47:00+00:00","author":"Forescout Research - Vedere Labs","twitter_card":"summary_large_image","twitter_creator":"@Forescout","twitter_site":"@Forescout","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.forescout.com\/blog\/the-riskiest-connected-devices-in-enterprise-networks\/#article","isPartOf":{"@id":"https:\/\/www.forescout.com\/blog\/the-riskiest-connected-devices-in-enterprise-networks\/"},"author":{"name":"Forescout Research - Vedere Labs","@id":"https:\/\/www.forescout.com\/#\/schema\/person\/038ef2eda17d37f87d9978fa703ee984"},"headline":"The Riskiest Connected Devices in Enterprise Networks","datePublished":"2022-10-12T12:00:26+00:00","dateModified":"2022-10-19T20:47:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.forescout.com\/blog\/the-riskiest-connected-devices-in-enterprise-networks\/"},"wordCount":979,"publisher":{"@id":"https:\/\/www.forescout.com\/#organization"},"articleSection":["News &amp; Views"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.forescout.com\/blog\/the-riskiest-connected-devices-in-enterprise-networks\/","url":"https:\/\/www.forescout.com\/blog\/the-riskiest-connected-devices-in-enterprise-networks\/","name":"Riskiest IT, IoT, OT & IoMT Devices in Enterprise Networks - Forescout","isPartOf":{"@id":"https:\/\/www.forescout.com\/#website"},"datePublished":"2022-10-12T12:00:26+00:00","dateModified":"2022-10-19T20:47:00+00:00","description":"Vedere Labs reveals the riskiest IT, IoT, OT and IoMT devices in enterprise networks, what makes them so risky and how to mitigate their cyber risks.","breadcrumb":{"@id":"https:\/\/www.forescout.com\/blog\/the-riskiest-connected-devices-in-enterprise-networks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.forescout.com\/blog\/the-riskiest-connected-devices-in-enterprise-networks\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.forescout.com\/blog\/the-riskiest-connected-devices-in-enterprise-networks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.forescout.com\/"},{"@type":"ListItem","position":2,"name":"The Riskiest Connected Devices in Enterprise Networks"}]},{"@type":"WebSite","@id":"https:\/\/www.forescout.com\/#website","url":"https:\/\/www.forescout.com\/","name":"Forescout","description":"","publisher":{"@id":"https:\/\/www.forescout.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.forescout.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.forescout.com\/#organization","name":"Forescout Technologies, Inc.","url":"https:\/\/www.forescout.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","contentUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","width":1,"height":1,"caption":"Forescout Technologies, Inc."},"image":{"@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ForescoutTechnologies","https:\/\/x.com\/Forescout","https:\/\/www.instagram.com\/forescouttechnologies\/","https:\/\/www.linkedin.com\/company\/forescout-technologies","https:\/\/www.youtube.com\/user\/forescout1"]},{"@type":"Person","@id":"https:\/\/www.forescout.com\/#\/schema\/person\/038ef2eda17d37f87d9978fa703ee984","name":"Forescout Research - Vedere Labs","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/#\/schema\/person\/image\/b4c8db5600adef8fa1a89cc86e15c781","url":"https:\/\/secure.gravatar.com\/avatar\/6f43608a91eb86cde1564e21650235d0ed570d1ae0fbd371a265636ed603e70d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6f43608a91eb86cde1564e21650235d0ed570d1ae0fbd371a265636ed603e70d?s=96&d=mm&r=g","caption":"Forescout Research - Vedere Labs"}}]}},"featured_media_url":false,"is_file":false,"excerpt_manually_set":false,"_links":{"self":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/posts\/74677","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/users\/124"}],"replies":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/comments?post=74677"}],"version-history":[{"count":0,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/posts\/74677\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/media?parent=74677"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/categories?post=74677"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/tags?post=74677"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/coauthors?post=74677"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}